Chandio et al., 2024 - Google Patents
Stealthy and practical multi-modal attacks on mixed reality trackingChandio et al., 2024
View PDF- Document ID
- 1029941557388387796
- Author
- Chandio Y
- Bashir N
- Anwar F
- Publication year
- Publication venue
- 2024 IEEE International Conference on Artificial Intelligence and eXtended and Virtual Reality (AIxVR)
External Links
Snippet
Mixed Reality (MR) is rapidly becoming an essential technology for critical applications such as physical therapy and surgery, in addition to its early use for leisure activities. This transition necessitates a focused look at the security aspects of MR devices and …
- 230000004927 fusion 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/011—Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
- G06F3/012—Head tracking input arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/011—Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
- G06F3/013—Eye tracking input arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/011—Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
- G06F3/014—Hand-worn input/output arrangements, e.g. data gloves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sikder et al. | A survey on sensor-based threats and attacks to smart devices and applications | |
| Sikder et al. | A survey on sensor-based threats to internet-of-things (iot) devices and applications | |
| Yu et al. | A survey on cyber–physical systems security | |
| US12380455B2 (en) | Method, device, and system of detecting mule accounts and accounts used for money laundering | |
| US10685355B2 (en) | Method, device, and system of detecting mule accounts and accounts used for money laundering | |
| Wang et al. | A survey on recent advanced research of CPS security | |
| US10579817B2 (en) | Systems and methods for front-end and back-end data security protocols | |
| US11265721B1 (en) | Secure device attestation and mutual authentication of artificial reality devices | |
| Uluagac et al. | Sensory channel threats to cyber physical systems: A wake-up call | |
| Chandio et al. | Stealthy and practical multi-modal attacks on mixed reality tracking | |
| US11087029B1 (en) | Encryption engine and decryption engine with glitch randomization to prevent side channel attacks | |
| US20230368206A1 (en) | System, Device, and Method of Transaction Verification Based on Auxiliary Signals and Modulations | |
| US20200250296A1 (en) | Detecting compromised credentials by improved private set intersection | |
| US20230403270A1 (en) | System and method for dynamic user authentication | |
| Chen et al. | Internet of Things (IoT) authentication and access control by hybrid deep learning method-a study | |
| US20210184832A1 (en) | Multi-key encryption and decryption for side channel attack prevention | |
| Zhang et al. | Presence attestation: The missing link in dynamic trust bootstrapping | |
| US20230298226A1 (en) | Systems and methods for ar/vr device improvements | |
| Assaderaghi et al. | Privacy and security: Key requirements for sustainable IoT growth | |
| US12373539B2 (en) | Systems and methods for using occluded 3D objects for mixed reality CAPTCHA | |
| Sniatala et al. | Evolution of Smart Sensing Ecosystems with Tamper Evident Security | |
| Sobana et al. | Securing future autonomous applications using cyber-physical systems and the Internet of Things | |
| Shang | Security and Privacy of Augmented Reality Systems | |
| Jiang et al. | False Reality: Uncovering Sensor-induced Human-VR Interaction Vulnerability | |
| Chen et al. | Securing Augmented Reality Applications |